Browse > Article

Analysis on Digital Image Composite Using Interpolation  

Song, Geun-Sil (중앙대학교 첨단영상대학원)
Yun, Yong-In (중앙대학교 첨단영상대학원)
Lee, Won-Hyung (중앙대학교 첨단영상대학원)
Publication Information
Abstract
In this paper, we propose a new method for detecting digital forgery that identify interpolated region between digital composited images. For detecting the interpolation factor and the tampered regions, we perform two algorithms: The first algorithm is to estimate the interpolation factors using the differential equation for forgery image along the horizontal, vertical, and diagonal directions, respectively; The second algorithm is to scan the interpolation factors along each direction for detection areas as the mask of the optical window size($64{\times}64$) in order to find out the forgery region. A detection map of the forgery is classified with the magnitude of estimated interpolation factors into colors. This detection map can be used to find out interpolated regions from the tampered image. Experimental results demonstrate the proposed algorithms are proven on several examples. We also show the proposed approach is to accurately detect interpolated regions from digital composite images.
Keywords
Digital Forgery; Interpolation; Re-sampling; Differential equation; DFT;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Popescu and H. Farid, "Exposing digital forgeries by detecting traces of re- sampling," IEEE Transactions on Signal Processing, Vol.53, No.2, pp.758-767, 2005.   DOI
2 A. Popescu and H. Farid, "Statistical tools for digital forensics," in 6th International Workshop on Information Hiding, pp.128-147, 2004.
3 A. C. Gallagher, "Detection of linear and cubic interpolation in JPEG compressed Images," The 2nd Canadian Conference on Computer and Robot Vision, pp.65-72, 2005.
4 S. Prasad and K. R. Ramakrishnan, "On re-sampling detection and its application to image tampering," in Proceedings of the IEEE International Conference on Multimedia and Expo, pp.1325-1328, 2006.
5 B. Mahdian and S. Saic, "Blind authentication using periodic properties of interpolation," IEEE Transactions on Information Forensics and Security, Vol.3, pp.529-538, 2008.   DOI
6 B. Mahdian and S. Saic, "Blind methods for detecting image fakery," in IEEE International arnahan Conference on Security Technology, pp.280-286, 2008.